Libinput Hit By Worrying Security Issues With Its Lua Plug-In System

7 points by laktak


technomancy

As soon as I saw "sandbox escape" I immediately thought "I bet they let you load bytecode directly" and yep, that's how the attack works.

If you go look back at the history of vulnerabilities in Lua, almost all the sandbox escapes only happened in cases where the sandbox accepted bytecode. It's a design flaw in Lua IMO that the same load function accepts both code and bytecode, and one is safe while the other isn't. You can restrict it by passing an additional argument, but they really should be separate functions!

hailey

I'm not really sure why these bugs warrant CVEs? They should be fixed of course as they are unintended behaviours, but as far as I can tell plugins are only loaded from /etc and /usr and you need to be root to write there already.